mirror of
http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/opsec-blogposts.git
synced 2025-06-08 13:59:32 +00:00
updated qubes tutorials
This commit is contained in:
parent
7978673f86
commit
68ac71a535
33 changed files with 16 additions and 2 deletions
|
@ -4,7 +4,14 @@ date: 2024-12-20
|
|||
gitea_url: "http://git.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/nihilist/blog-contributions/issues/42"
|
||||
xmr: 87iB34vdFvNULrAjyfVAZ7jMXc8vbq9tLGMLjo6WC8N9Xo2JFaa8Vkp6dwXBt8rK12Xpz5z1rTa9jSfgyRbNNjswHKTzFVh
|
||||
---
|
||||
# Qubes OS guide
|
||||
# Qubes Host OS setup guide
|
||||
|
||||
|
||||
**DISCLAIMER: Qubes OS is not suitable as a Host OS for our [Deniability tutorials](../deniability/index.md) because it lacks the live mode and ram-wipe feature** (which is a hard requirement), we consider Qubes OS as suitable for Private and Anonymous uses at best, **IT CANNOT be used for sensitive use** unlike with our main [Kicksecure Host OS](../linux/index.md) recommendation.
|
||||
|
||||

|
||||
|
||||
([source of the forum thread](https://forum.qubes-os.org/t/what-is-the-consensus-on-running-vms-in-a-hidden-veracrypt-volume/28721/9))
|
||||
|
||||
Official site of Qubes OS <https://www.qubes-os.org>
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue